Using Secure Multi Party Computation to Aggregate Sensitive Cybersecurity Defense and Loss Data from Multiple Firms In Order to Understand the Threat Landscape and Guide Firm-Level Security Investment
Some embodiments relate to a system for performing a multi-party computation among a plurality of parties. The system receives encrypted data sets generated by devices associated with the plurality of parties, wherein each of the encrypted data sets is generated by a respective one of the devices by encrypting data using a key shared among the devices. The system performs a computation on an aggregate of the encrypted data sets to obtain an encrypted result of the computation The system transmits the encrypted result of the computation to at least two of the devices. The system receives partially decrypted shares of the encrypted result generated by the at least two devices, wherein each of the partially decrypted shares is generated by a respective one of the at least two devices by partially decrypting the encrypted result using a private key of the respective device. The system generates a decrypted result of the computation using the partially decrypted shares of the encrypted result.
Researchers
-
multi-party computation system
United States of America | Pending
License this technology
Interested in this technology? Connect with our experienced licensing team to initiate the process.
Sign up for technology updates
Sign up now to receive the latest updates on cutting-edge technologies and innovations.